ReddingITPro

Technical Blog of Jason Olson

Any user can unlock now with this custom GINA

This Article is Now Outdated: Since the introduction of Windows 10, reliable multi-user switching is supported in the business environment. It is retained for historical purposes. From the folks over

Read More

HIPAA Compliance & Faxing

The primary objective of HIPAA is that health organizations have the infrastructure and procedures – administrative, technical and physical – that allow them to safeguard patient health information from any

Read More

Encrypted E-mail Solutions

Here is some information on setting up secure e-mail encryption with outside parties. There are basically two options available. Prices can vary based on the selected vendor and the information

Read More

IT Services Policy: Billable Hour

This is to help define what activity is billable versus non-billable activity under a typical Managed Services Agreement (MSA/MSP). Beyond the obvious that activity which is for the direct benefit

Read More

Technology Policies/User Passwords

It is the general policy that the IT staff does not need to know the individual user passwords and will take every effort to ensure that we do not keep

Read More

Technology Policies/Network Printers

Network Assignment To properly configure network printers initially on a windows network: Leave printers setup in DHCP Check DHCP server and use the MAC address information to establish a DHCP

Read More

Exchange Mailboxes and Disabled AD Accounts

We have all had the issue for a client where an employee leaves and their account should be disabled and usually someone would like to receive email on their behalf…

Read More

Technology Policies/Guest Users

We’re starting a new series on Monday called “Policy Monday” to help share common technology policies. This week we’ll start with Adding Guest Accounts to the Network. The following is

Read More

BitLocker to Go in Windows 7

For the enterprise customer one of the greatest integrated features in Windows Vista was the new BitLocker technology. However it was limited to only encrypting the local hard drives. Now,

Read More

Exchange/Outlook Hard-Delete

When typically working with e-mail within Outlook you will read your e-mail, and then perhaps delete it which will move it to the “Deleted Items” folder. From there, you may

Read More